• Open Menu Close Menu
  • Apple
  • Shopping Bag
  • Apple
  • Mac
  • iPad
  • iPhone
  • Watch
  • TV
  • Music
  • Support
  • Search apple.com
  • Shopping Bag

Lists

Open Menu Close Menu
  • Terms and Conditions
  • Lists hosted on this site
  • Email the Postmaster
  • Tips for posting to public mailing lists
APPLE-SA-2013-10-22-6 Apple Remote Desktop 3.5.4
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

APPLE-SA-2013-10-22-6 Apple Remote Desktop 3.5.4


  • Subject: APPLE-SA-2013-10-22-6 Apple Remote Desktop 3.5.4
  • From: Apple Product Security <email@hidden>
  • Date: Tue, 22 Oct 2013 19:37:51 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2013-10-22-6 Apple Remote Desktop 3.5.4

Apple Remote Desktop 3.5.4 is now available and addresses the
following:

Apple Remote Desktop
Available for:  Apple Remote Desktop 3.0 or later
Impact:  A remote attacker may be able to cause arbitrary code
execution
Description:  A format string vulnerability existed in Remote
Desktop's handling of the VNC username.
CVE-ID
CVE-2013-5135 : SilentSignal working with iDefense VCP


Apple Remote Desktop 3.5.4 may be obtained from the Software Update
pane in System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

The download file is named:  "ARDClient3.5.4.dmg"
Its SHA-1 digest is: 5c22ffdabe875da62644331e63e64d6b27ad9afc

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=hABT
-----END PGP SIGNATURE-----

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (email@hidden)
Help/Unsubscribe/Update your Subscription:

This email sent to email@hidden


  • Prev by Date: APPLE-SA-2013-10-22-5 OS X Server 3.0
  • Next by Date: APPLE-SA-2013-10-22-7 Apple Remote Desktop 3.7
  • Previous by thread: APPLE-SA-2013-10-22-5 OS X Server 3.0
  • Next by thread: APPLE-SA-2013-10-22-7 Apple Remote Desktop 3.7
  • Index(es):
    • Date
    • Thread